Resolve NTP vulnerability on Airwave

Introduction : This article talks about resolving the NTP vulnerability on Airwave

Configuration Steps : We might get the below information when we run a Nessus scan against AirWave.

SynopsisThe remote network time service could be used for network reconnaissance or abused in a distributed denial of service attack.

Description17The version of ntpd on the remote host has the 'monlist' command enabled. This command returns a list of recenthosts that have connected to the service. As such, it can be used for network reconnaissance or, along with a spoofedsource IP, a distributed denial of service attack.

SolutionIf using NTP from the Network Time Protocol Project, either upgrade to NTP 4.2.7-p26 or later, or add 'disablemonitor' to the 'ntp.conf'configuration file and restart the service. Otherwise, contact the vendor.